Key size

Results: 607



#Item
281Strategic management / Competition / Thirty-Six Stratagems / Military strategy / Strategist / Business school / Competitive advantage / Strategie / Business ethics / Management / Business / Strategy

Outthink the competition The key to gaining a competitive advantage is to find a “winning move” Contrary to commonly held assumptions, size and resources play minor

Add to Reading List

Source URL: www.strategeme.com

Language: English - Date: 2007-07-04 02:34:55
282Ciphertext indistinguishability / Semantic security / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / Ciphertext / Probabilistic encryption / Hybrid cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley1 , Goichiro Hanaoka2 Hideki Imai2 , Anderson C. A. Nascimento1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-08 17:57:32
283Elliptic curve cryptography / Cryptographic protocols / Key size / Diffie–Hellman key exchange / Elliptic curve / Elliptic Curve DSA / Whitfield Diffie / ECC patents / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Public-key cryptography

A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography David J. Malan, Matt Welsh, Michael D. Smith Division of Engineering and Applied Sciences Harvard University {malan,mdw,smit

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2004-08-24 12:30:22
284Internet Key Exchange / Diffie–Hellman key exchange / Elliptic curve cryptography / Hellman / Key size / Request for Comments / XTR / Oakley protocol / Cryptography / Cryptographic protocols / Finite fields

Internet Engineering Task Force (IETF) Request for Comments: 5903 Obsoletes: 4753 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-06-11 19:22:25
285Sedans / Mid-size cars / Station wagons / Nissan Altima / Ignition switch / Remote starter / Starter / Toyota Tercel / Key / Transport / Private transport / Coupes

Installation Notes Installation Notes - Document #133 - Sheet 1 of 2 Toyotas - Camry / Avalon / Tercel / 4 Runner & Nissan Altima 1995+ Toyota Avalon (replaces the Cressida), you can find the door lock wires in the

Add to Reading List

Source URL: www.readyremote.com

Language: English - Date: 2006-08-10 14:23:45
286Baseball cards / Trading cards / Ring / Control key / Brassiere measurement / Beverage can / Technology / Clothing / Ring size / Rings

Ring Size Guide[removed]inches Printing Instructions For accurate sizing, print this guide at 100%.

Add to Reading List

Source URL: www.belk.com

Language: English - Date: 2014-08-04 22:02:12
287FIPS 140-2 / Cryptographic primitive / Cryptographic hash function / Block cipher / Protection Profile / FIPS 140 / Key size / SHA-2 / PKCS / Cryptography / Cryptography standards / Common Criteria

Ärendetyp: 6 SP-188 Diarienummer 13FMV128772:1 Dokument ID FMVID[removed]

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2013-06-25 04:56:56
288Cryptographic hash functions / Hashing / SHA-2 / Transport Layer Security / SHA-1 / HMAC / Message authentication code / Collision attack / Key size / Cryptography / Cryptographic protocols / Internet protocols

Approved Cryptographic Algorithms Good Practice Guideline Programme NHS Informatics

Add to Reading List

Source URL: systems.hscic.gov.uk

Language: English
289Cryptographic hash functions / Cryptography standards / Advanced Encryption Standard / FIPS 140-2 / Key size / SHA-2 / Block cipher / HMAC / SHA-1 / Cryptography / Cryptographic software / Hashing

FIPS PUB[removed]Security Policy for SAP NW SSO 2.0 Secure Login Library Crypto Kernel Document version: 1.4 Date: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:56:17
290Quantum cryptography / Quantum information science / Quantum computer / RSA / Quantum mechanics / Cryptosystem / Quantum / Index of cryptography articles / Key size / Cryptography / Theoretical computer science / Applied mathematics

Quantum Cryptography Today and Tomorrow Or How to Make and Break Quantum Cryptosystems (Without Being an Expert in Quantum Mechanics)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 13:36:05
UPDATE